Keyphrases
Detection Method
100%
Industrial Internet of Things (IIoT)
100%
Intrusion Detection
100%
Fog Environment
100%
Traffic Data
27%
Deep Learning Model
18%
Fog Nodes
18%
Multi-head Attention
18%
Traffic Sequence
18%
Local Representation
18%
Internet of Things Forensics
18%
Training Parameters
9%
Forensic
9%
Service Provider
9%
Internet Technology
9%
Deep Learning Methods
9%
Deep Learning
9%
Long-range Dependence
9%
Cloud Platform
9%
Gated Recurrent Unit
9%
Forensic Techniques
9%
User Data
9%
Internet of Things Devices
9%
Intruder
9%
Global Representation
9%
Evaluation Measures
9%
Parallelizing
9%
Recurrent Deep Learning
9%
Attention Layer
9%
Forensic Framework
9%
Residual Connection
9%
Worker Node
9%
Limiting Performance
9%
Fog Computing Environment
9%
Computer Science
Industrial Internet of Things
100%
Intrusion Detection
100%
Deep Learning Model
18%
Deep Learning Method
18%
Information Loss
9%
User Data
9%
Cloud Platform
9%
Gated Recurrent Unit
9%
Fog Computing
9%
Internet of Things Device
9%
Range Dependency
9%
Computing Environment
9%
Forensic Technique
9%
Evaluation Measure
9%
Internet-Of-Things
9%